|
You are here |
r2c.dev | ||
| | | | |
get.semgrep.dev
|
|
| | | | | ||
| | | | |
www.wiz.io
|
|
| | | | | CI/CD pipelines, as an essential part of the software development process, are an attractive target to malicious actors. Based on our research of cloud environments, we share common misconfigurations and provide tips on how to remediate them in order to prevent supply-chain attacks. | |
| | | | |
www.evasec.io
|
|
| | | | | Multiple vulnerabilities affecting the CocoaPods ecosystem, have been discovered, posing a major risk of supply chain attacks. | |
| | | | |
blog.nlnetlabs.nl
|
|
| | | How do supply chain security obligations under the European NIS2 legislation affect those that develop the Free and Open Source Software used by "essential providers" of digital infrastructure? An overview of the response to the public comment period to the NIS2 draft implementing act. | ||